CSDN论坛 > Linux/Unix社区 > 应用程序开发区

寻找《HP-UX System and Network Administration II》(H3605S) [问题点数:0分]

Bbs1
本版专家分:0
结帖率 100%
CSDN今日推荐
匿名用户不能发表回复!
其他相关推荐
the.practice.of.system.and.network.administration.2nd.edition
linux system and network administration
关于linux 网络配置的几种方法
最近工作中 经常得重装系统,所以就得自己配置网络。这在windows下应该说是非常简单,几秒钟就搞定。但在linux下,有时会有点麻烦,对有窗口界面的还好一点,一般都会提供相应的窗口进行网络配置。如在Ubuntu中 就有System->Administration->Network  在其中可对ip,host,dns等进行配置。 但我是对远程机器进行配置,用的是服务器上blade的im
HP-UX System Administration Tasks
HPUX系统管理员手册
转【FAQ:HP-UX System and Network Administration】
 --------------------------------/dev/dsk/c1t0d0c1:硬盘连接的接口卡的实例号t0:scsi硬盘的id号d0:逻辑单元号---------------unix 的文件系统---------------1). UNIX 的文件系统是树状结构,从根开始,从表面上看,文件系统好象是一个整体,但实际上,文件系统可以分成不同的部分,单独占据一块逻辑卷,就是一个
UNIX and Linux System Administration Handbook(5th) 无水印英文高清完整.pdf版下载
UNIX and Linux System Administration Handbook(5th) 英文无水印pdf 第5版 pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
Oracle Database 11g Administration Workshop II (数据库管理-课堂练习II 学生指南第2册)
Oracle Database 11g Administration Workshop II (数据库管理-课堂练习II 学生指南第2册)
Solaris10 TCP-IP网络管理SA300S10_SG
Network Administration for the Solaris™ 10 Operating System
SELinux.System.Administration.2nd.Edition
Key Features Leverage SELinux to improve the secure state of your Linux system A clear approach to adopting SELinux within your organization Essential skills and techniques to help further your system administration career Book Description Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This book will show you how to enhance your system's secure state across Linux distributions, helping you keep application vulnerabilities at bay. This book covers the core SELinux concepts and shows you how to leverage SELinux to improve the protection measures of a Linux system. You will learn the SELinux fundamentals and all of SELinux's configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you may come across as an administrator. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SELinux. By the end of the book you will know how SELinux works and how you can tune it to meet your needs. What you will learn Analyze SELinux events and selectively enable or disable SELinux enforcement Manage Linux users and associate them with the right role and permission set Secure network communications through SELinux access controls Tune the full service flexibility by dynamically assigning resource labels Handle SELinux access patterns enforced through the system Query the SELinux policy in depth Table of Contents Chapter 1: Fundamental SELinux Concepts Chapter 2: Understanding SELinux Decisions and Logging Chapter 3: Managing User Logins Chapter 4: Process Domains and File-Level Access Controls Chapter 5: Controlling Network Communications Chapter 6: sVirt and Docker Support Chapter 7: D-Bus and systemd Chapter 8: Working with SELinux Policies Chapter 9: Analyzing Policy Behavior Chapter 10: SELinux Use Cases
UNIX and Linux System Administration Handbook(5th) azw3
UNIX and Linux System Administration Handbook(5th) 英文azw3 第5版 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
UNIX and Linux System Administration Handbook (5th Ed).pdf
UNIX and Linux System Administration Handbook (5th Ed).pdf
关闭